av test

Results 276 - 300 of 395Sort Results By: Published Date | Title | Company Name
By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     BlackBerry Cylance
By: TrendMicro     Published Date: May 09, 2011
The test doesn't just score how well a product can detect file-based threats (Infection Layer), but includes the ability to block the threat at its source (Exposure Layer) and detect/block the threat during execution (Dynamic Layer). Click here to see the results.
Tags : trendmicro, endpoint security, benchmark testing, av-test.org
     TrendMicro
By: Electric Cloud     Published Date: Aug 07, 2009
Drive quality earlier in the development process with continuous testing. Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for identifying errors early so they can be corrected immediately by the developer who made the code changes.
Tags : software development, electriccommander, electric cloud, continuous testing, development, coding, testing, production, errors, ci cycle, intuit, defect tracking, integrated solution
     Electric Cloud
By: iCims     Published Date: Jan 07, 2014
The War for Talent is going to have winners and losers, and we all want to hire a winning team. In such a competitive environment, an outstanding employment brand is required to attract the best and brightest. While most talent acquisition professionals know in theory that a company’s employment brand is key, few really analyze the candidate experience as the most important element of your brand. This eBook will dive into everything HR managers and recruiters must know about optimizing the candidate experience. You will also receive a product demo.
Tags : applicant tracking systems (ats), candidate sourcing, employment applications, hiring, hr strategy, human resource technology, job descriptions, online recruiting, recruiting, recruiting software/services, recruiting technology, talent management
     iCims
By: AuditBoard     Published Date: Nov 26, 2018
You are the CAE of a mature company sitting with your external auditor, ready to kick off planning for the upcoming year. You’ve always been on top of your controls environment, and expect this upcoming year to go smoothly. However, mid-way through discussing your new areas of focus, the conversation goes astray as your auditor starts throwing out terms like “IPE” or “Electronic Audit Evidence” and says a whole new set of evaluation points will have to occur for every control test in your environment.
Tags : 
     AuditBoard
By: Lola Travel Company     Published Date: Jan 24, 2019
As a finance manager, there are a lot of hurdles you encounter that make managing business travel more difficult than it needs to be: chasing receipts, keeping track of multiple employees traveling, making sure everyone’s on the same page with spend, etc. Thankfully, Lola.com has an answer. Check out our latest guide,”How to Simplify Your Company’s Travel Expenses” and learn: -The vital importance of eliminating paper receipts -How simple guidelines improve employee compliance -Why a digital platform helps you easily monitor and control budget
Tags : 
     Lola Travel Company
By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Mar 31, 2016
"Fingers wagging, eyes squinting –“Why didn’t you find this problem during testing?!”How many times have you been asked that, only to try to defend yourself with things like “we can’t test everything!” and “it’s a corner case”? Everyone knows you can’t improve quality by testing alone, so what can you do when your testing team is taking the blame for poor quality in production? Join us on this TechByte session where we will discuss practices and tools that will help improve your test effectiveness and overall quality."
Tags : ibm, middleware, cloud, devops, techbyte
     IBM
By: Gomez IT     Published Date: May 23, 2011
Load testing is not a new concept and many of you have probably used various load testing tools prior to major releases with varying degrees of success. Yet, we still see new web applications or newly launched web sites for which performance is not meeting the demands of the customer base.
Tags : web performance management, compuware, gomez, andrea mulligan, load testing, saas, web applications, emarketing program, major traffic event, website performance
     Gomez IT
By: Seagate Technology     Published Date: Apr 14, 2015
You can have all the latest features of iOS 8 on your iPhone, but if you’re still using an iPhone 4s, you won’t be able to take advantage of most of them. This should serve as an appropriate metaphor for this audience because when it comes to data storage, many of today’s storage solutions have been around since the 1970s…as in the the world of mobile, today’s data storage needs are revealing just how limited those older solutions are. Even if a company has updated almost everything in its IT ecosystem, it takes only one unchanged layer to prevent them from realizing the benefits of the latest technology. With petabyte scale, reliability, performance, and efficiency the order of the day we are fast approaching that point with storage. There is without question a need to change in the current storage paradigm. In this webinar you will learn about current IT storage challenges and useful insights about next-generation storage solutions.
Tags : storage solutions, mobile data storage, it ecosystem, petabyte scale
     Seagate Technology
By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
     Vision Solutions
By: Vocus, Inc     Published Date: Jan 16, 2009
Rapid media changes make it challenging for PR professionals to keep up.  Discover methods to navigate through today’s media landscape, while you stay ahead of the changes. Uncover techniques for building strong media relationships using the latest technology, to achieve PR success.
Tags : vocus, media landscape, pr professionals, public relations, media relationships, pr success
     Vocus, Inc
By: Pardot     Published Date: Apr 29, 2009
You've laid the groundwork and attracted the visitors, now conversion is key. As a B2B marketer, you typically have a very limited window to prove your value proposition. Learn eight simple techniques, including progressive profiling, form validation and multivariate testing, that will help you fine tune your landing pages and increase conversion rates.
Tags : pardot, b2b conversions, double b2b conversions, b2b marketer, groundwork, landing pages, conversion rates, ctr, click-thru, form validation, multivariate testing, b2c, website caller id, jigsaw, whois, prospect, suspect, lead source, error messages, drop off
     Pardot
By: Cornerstone OnDemand     Published Date: Jan 20, 2017
As much as we try to avoid it, performance reviews seemingly boil down to last minute gathering of notes and memories, prodded by HR chasing you down to meet deadlines. Sound familiar? The cycle can be broken. In our latest ebook, learn about 5 strategies that help you have a more effective performance review season. Learn how to: Align employee goals to company goals Provide continuous feedback and coaching Tie performance reviews to learning opportunities Use all of the data collected to make informed and actionable decisions Avoid the performance review spiral, download 5 Strategies for More Effective Performance Reviews today!
Tags : 
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Oct 13, 2017
As much as we try to avoid it, performance reviews seemingly boil down to last minute gathering of notes and memories, prodded by HR chasing you down to meet deadlines. Sound familiar? The cycle can be broken. In our latest ebook, learn about 5 strategies that help you have a more effective performance review season. Learn how to: • Align employee goals to company goals • Provide continuous feedback and coaching • Tie performance reviews to learning opportunities • Use all of the data collected to make informed and actionable decisions Avoid the performance review spiral, download 5 Strategies for More Effective Performance Reviews today!
Tags : 
     Cornerstone OnDemand
By: SAS     Published Date: Jun 05, 2017
Data professionals now have the freedom to create, experiment, test and deploy different methods easily – using whatever skill set they have – all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organizations get faster results and better ROI from analytics efforts.
Tags : 
     SAS
By: SAS     Published Date: Dec 20, 2018
Data professionals now have the freedom to create, experiment, test and deploy different methods easily using whatever skill set they have and all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organisations get faster results and better ROI from analytics efforts.
Tags : 
     SAS
By: SAS     Published Date: Apr 17, 2019
Organizations are charging ahead with investments in cloud and analytics to deliver agility, scalability and cost savings. With computing power advancements and continuous growth of data, cloud provides the elastic workloads and flexibility required for modern business. However, the environment of flexibility and choice that cloud provides also creates complexity and challenges. In this white paper, learn how organizations are applying expertise and using the latest methods to move analytics to the cloud, including: Why are organizations moving analytic work to the cloud? What are the key challenges and misconceptions? How do IT leaders provide choice while maintaining control?
Tags : 
     SAS
By: IBM     Published Date: Apr 26, 2013
Virtualization continues to lead a sea change for enterprise-scale data centers and cloud environments, delivering well-established benefits such as cost savings, reduced physical space and power requirements, simpler and more flexible testing environments, faster server provisioning, and improved return on investment. Yet for many organizations, one of virtualization’s greatest benefits is only now being realized in the form of highly portable and flexible virtual images. Natural extensions of virtualization technology, virtual images help organizations achieve even greater efficiencies and cost savings.
Tags : control, virtual, lifecylce, enterprise, data centers, cloud environments, virtualization
     IBM
By: Cisco     Published Date: Apr 10, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : cisco, byod, wifi, wireless, wlan, productivity, design guide, system design
     Cisco
By: Cisco     Published Date: Jun 02, 2015
Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment. See how in this whitepaper.
Tags : use cases, design guide, campus wireless, deployment, multicast support, channel planning, bandwidth performance, wireless
     Cisco
By: Cisco     Published Date: Dec 21, 2016
Located at a hub of innovation, Hyatt Regency Santa Clara caters to sophisticated, technology-savvy guests. This made it the perfect location for Hyatt Hotels to use as a model property in its quest to create the digital hotel of the future. Wi-Fi is one of the most visible services a hotel provides, and is crucial to guest experiences and loyalty. “We had limited Wi-Fi coverage that was not designed for the modern, mobile digital guest,” explains Dania Duke, general manager at Hyatt Regency Santa Clara. “We quickly learned that to stay competitive in Silicon Valley, we need to have the fastest, best Wi-Fi available.”
Tags : 
     Cisco
By: McAfee     Published Date: Feb 12, 2013
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : mcafee, av-test, deep defender, rootkits, detection
     McAfee
By: Polycom     Published Date: Aug 16, 2017
"The traditional office space is dead. Chased out by the combining forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Studies show that up to 82% of knowledge workers feel they need to collaborate with others throughout the day to get work done. Yet, according to an IBM study, 78% say they struggle to effectively connect their workplace and help people collaborate—either virtually or face-to-face1. Why? The answer is not all collaboration is alike. Download this report to get the latest trends in office space utilization and find out about the three main types of collaboration and how they need to be supported differently in the work environment. The office may be shrinking, but it’s not going away anytime soon. If anything, the rising demand for more teamwork and collaboration makes the configuration of workspaces more important than ever."
Tags : polycom, video conferencing technology, collaboration
     Polycom
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com